Wireless Security Architecture - Department of Computer...

21
1 Secure Systems Research Group - FAU © 2005 Saeed Rajput, Wireless Security Architecture Saeed Rajput Dept. of Computer Science and Eng. Florida Atlantic University http://www.cse.fau.edu/~saeed © Saeed Rajput, 2005

Transcript of Wireless Security Architecture - Department of Computer...

Page 1: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

1

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Wireless Security Architecture

Saeed RajputDept. of Computer Science and Eng.

Florida Atlantic Universityhttp://www.cse.fau.edu/~saeed

© Saeed Rajput, 2005

Page 2: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

2

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Which Security?• Link Layer• Network Layer• Transport Layer• Application Layer• Enterprise (Business) Layer

Erten, Y.M., A layered security architecture for corporate 802.11 wireless networks, IEEE Wireless Telecommunications Symposium, 2004, Vol., Iss., 14-15 May 2004

������������� ����

����������������

����������

�����

�������������

�������

����������������

�������������

��������� ����

�����

��������������

�������������������

Page 3: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

3

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Security Technologies:

���������������

��������

�������

������������

�������������

������������ ������������

�������� ���������������������������������������

�!���� "�����������#�������$�

#���%��� ��& '!

!!����!����(�������#���%��� ��

& '!

!)* *���!����!!+������������#���%��� ��+ '!

(�������,�-�������� ��

!�������!������� ��� '!�

Page 4: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

4

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Two Extremes: Of Encryption Options

• Link Encryption• End-to-End Encryption

Page 5: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

5

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Link Encryption

Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc.

Page 6: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

6

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Encrypted Message (Link Encryption)

Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc.

Page 7: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

7

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

End-to-End Encryption

Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc.

Page 8: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

8

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Encrypted Message (End-to-End)

Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc.

Page 9: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

9

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

End-to-End Encryption

Pfleeger, C. P., and Plfeeger, S. L. Security in computing, 3/E (c) 2003, by Pearson Education, Inc.

Page 10: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

10

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

How is Wireless Security Different?• Vulnerable due to open access to wired network.• Greater potential of loss of authorized hardware• Demands on Ubiquitous access: Changing IP address• Demands on sustained connectivity while roaming• Unreliable channel• Limited computation power of devices• Easy to launch DOS attacksArbaugh, W.A., Wireless security is different, IEEE Computer, Vol.36, Iss.8, Aug. 2003

Page 11: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

11

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Requirements: Wireless Security Architecture• Manageable Security• Computationally feasible Security?• Multi-layered: To provide failover safety• Centralized control and management• Supports Roaming• Friendly User Interface• Authentication (Ed’s suggestion)• Granular access control• Efficient: Does not cause significant overhead

Page 12: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

12

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Manageable Security• WEP is not manageable (Manual Key

updates)• Centralized access control even at layer 2:

e.g. IEEE 802.1X.– May use higher layer mechanisms (e.g. EAP-

TLS)• Issue:

– How to integrate with other access control mechanisms that are also required in an enterprise.

Page 13: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

13

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Computationally feasible Security?• Used as an excuse by mostly HW vendors

to push proprietary protocols.• E.g. SSL protocol easy to do even on

current Cell Phones (2003)– WTLS does not make sense.– WEP does not make sense in presence of

802.11i

Gupta, V.; Gupta, S., Experiments in wireless Internet security, Wireless Communications and Networking Conference, 2002. WCNC2002. 2002 IEEE, Vol.2, Iss., Mar 2002,

Pages: 860- 864 vol.2

Page 14: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

14

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Multi-layered: To provide failover safety• End-to-end security assumes:

– User will always be aware of security– The machine which user is using is secure– Security interfaces are anything but intuitive:

e.g.

Which website is secure?

Page 15: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

15

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Multi-layered: To provide failover safety• Lower layer security mechanisms can

provide some degree of security when upper security methods fail

• They do not need decisions to be made by users and their machines

Page 16: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

16

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Centralized control and management

• Difficult to do at lower layers.• For IEEE 802.11 -> 802.1x.• IKE for IP level – Centralized certification

authority• SSL – Need two way authentication –

Distribute certs to all users• Application Level easier.

Page 17: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

17

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Supports Roaming• Need Transport or higher layer security for

continuous security sessions.• Individual lower layer security associations (e.g.

IPSec and 802.11i) are terminated as device moves.

• Supports Session transfer e.g. from static to mobile stations

• Issues: Efficiency, and Security

Skow, E.; Jiejun Kong; Phan, T.; Cheng, F.; Guy, R.; Bagrodia, R.; Gerla, M.; Songwu Lu, A security architecture for application session handoff, Communications, 2002. ICC 2002. IEEE, International Conference on, Vol.4, Iss., 2002, Pages: 2058- 2063 vol.4

Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuki, Randy H. Katz, Secure authentication system for public WLAN roaming, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots table of contents, San Diego, CA, USA, Pages: 113 - 121

Page 18: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

18

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Granular access control• Difficult to provide granular access control

at lower layers.– Example: 802.1X AAA server, enables and

blocks ports (Layer 2).– IPSec enables and blocks applications.– Only Application Security can provide more

granularity.• Best provided at application• Issues:

– How to provide central control

Page 19: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

19

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Efficient: Does not cause significant overhead

• Specially critical when dealing with roaming PDAs in hospital and disaster recovery efforts

Skow, E.; Jiejun Kong; Phan, T.; Cheng, F.; Guy, R.; Bagrodia, R.; Gerla, M.; Songwu Lu, A security architecture for application session handoff, Communications, 2002. ICC 2002. IEEE, International Conference on, Vol.4, Iss., 2002, Pages: 2058- 2063 vol.4

Olariu, S.; Maly, K.; Foudriat, E.C.; Yamany, S.M., Wireless support for telemedicine in disaster management, Parallel and Distributed Systems, 2004. ICPADS 2004. Proceedings. Tenth International Conference on, Vol., Iss., 7-9 July 2004, Pages: 649- 656

Page 20: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

20

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Suggestions• Link Layer: (Yes)

– 802.11i with 802.1x• IPSec: (No – Yes when IPv6 becomes popular –

Mike)– Not good for roaming

• TLS: (Yes)– Do not use WTLS as it is not true Transport level protocol.– Enforce Client side cert.s

• Web service Security: (Yes) – No different from any other enterprise application.– Enhance it with location awareness

• Use hardware tokens to identify users and carry strong credentials for authentication e.g. RFIDS

Page 21: Wireless Security Architecture - Department of Computer ...security/public/docs/WirelessArchitecture_SaeedRajput.pdfWireless Security Architecture Saeed Rajput Dept. of Computer Science

21

Secure Systems Research Group - FAU © 2005 Saeed Rajput,

Mike’s Recommendation

• Propose a reference architecture based on suggestions.